White box traitor tracing
From MaRDI portal
Publication:2139638
DOI10.1007/978-3-030-84259-8_11zbMath1489.94115OpenAlexW3185365822MaRDI QIDQ2139638
Publication date: 18 May 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84259-8_11
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Risky traitor tracing and new differential privacy negative results
- On perfect correctness in (lockable) obfuscation
- New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
- Broadcast-optimal two-round MPC
- New approaches to traitor tracing with embedded identities
- Recursive constructions of secure codes and hash families using difference function families.
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- On Continual Leakage of Discrete Log Representations
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Functional Encryption with Bounded Collusions via Multi-party Computation
- On the Practical Security of Inner Product Functional Encryption
- Breaking and Repairing Asymmetric Public-Key Traitor Tracing
- From Selective to Adaptive Security in Functional Encryption
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Improving the Boneh-Franklin Traitor Tracing Scheme
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model
- Fully homomorphic encryption using ideal lattices
- Collusion resistant traitor tracing from learning with errors
- Function-Private Functional Encryption in the Private-Key Setting
- Obfuscation of Probabilistic Circuits and Applications
- Watermarking cryptographic capabilities
- On the impossibility of approximate obfuscation and applications to resettable cryptography
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
This page was built for publication: White box traitor tracing